Verichains
Subscribe
Sign in
Home
Security Advisories
Products & Services
Publications
Request A Quote
About
Latest
Top
Discussions
LIFI Attack: Arbitrary Calls and Infinite Approval Risk
On July 16th, 2024, a critical vulnerability was exploited in LIFI's new facet contract.
Jul 19
•
TK
1
Share this post
LIFI Attack: Arbitrary Calls and Infinite Approval Risk
blog.verichains.io
Copy link
Facebook
Email
Note
Other
Dough Finance - Lack of Input Data Verification
On July 12, 2024, Dough Finance experienced an exploit resulting in an estimated loss of $1.8 million. A design flaw in the ConnectorDeleverageParaswap…
Jul 15
•
lifebow
Share this post
Dough Finance - Lack of Input Data Verification
blog.verichains.io
Copy link
Facebook
Email
Note
Other
MRP token exploit analysis
On July 2, 2024, the MRP token on BSC experienced an exploit. The WMRP wrapped-token contract was attacked via a reentrancy vulnerability, resulting in…
Jul 9
•
nt
Share this post
MRP token exploit analysis
blog.verichains.io
Copy link
Facebook
Email
Note
Other
Analyzing the Flawed Logic in the JokInTheBox Attack
Overview
Jul 2
•
th13vn
Share this post
Analyzing the Flawed Logic in the JokInTheBox Attack
blog.verichains.io
Copy link
Facebook
Email
Note
Other
June 2024
Deep Dive: $110,000 OSN Token Exploit
Background
Jun 21
•
th13vn
2
Share this post
Deep Dive: $110,000 OSN Token Exploit
blog.verichains.io
Copy link
Facebook
Email
Note
Other
UwU hacked cause by price oracle manipulated
UwU Lend provides a contract allows other contracts to obtain asset prices in order to calculate the value of these assets for borrowing purposes…
Jun 14
•
LowK
Share this post
UwU hacked cause by price oracle manipulated
blog.verichains.io
Copy link
Facebook
Email
Note
Other
The Hidden Danger of Self-Transfers in ERC20 Contracts: A Lesson from the GPU Exploit
In the entire EVM blockchain ecosystem, the transfer function of the ERC20 smart contract is probably the most used function. It's a simple function…
Jun 7
•
TK
1
Share this post
The Hidden Danger of Self-Transfers in ERC20 Contracts: A Lesson from the GPU Exploit
blog.verichains.io
Copy link
Facebook
Email
Note
Other
Unveiling the Scroll Token Attack: A Case Study in Solidity Overflow
On May 29, 2024, the Scroll Token plunged in a dramatic price drop of 99.99% after a successful attack. The exploit involved the attacker transferring…
Jun 3
•
lifebow
Share this post
Unveiling the Scroll Token Attack: A Case Study in Solidity Overflow
blog.verichains.io
Copy link
Facebook
Email
Note
Other
May 2024
Verichains at HITBxPHDays Bangkok: Demystifying the Critical “Proof Forgery Attack” on zkEVM
This May, we made a return to Hack in the Box (HITB) Security Conference, took center stage at HITBxPHDays Bangkok, to delve deeper into this critical…
May 30
•
TK
Share this post
Verichains at HITBxPHDays Bangkok: Demystifying the Critical “Proof Forgery Attack” on zkEVM
blog.verichains.io
Copy link
Facebook
Email
Note
Other
Predy Finance Attack - How a Liquidity Pool Can Be Drained
The PredyPool contract on Arbitrum, part of the Predy Finance project, was attacked on May 14, 2024. In this attack, the attacker exploited a…
May 24
•
nt
Share this post
Predy Finance Attack - How a Liquidity Pool Can Be Drained
blog.verichains.io
Copy link
Facebook
Email
Note
Other
Compound V2 Forked Vulnerability - $20M Sonne Finance Hack
Introduction
May 20
•
th13vn
1
Share this post
Compound V2 Forked Vulnerability - $20M Sonne Finance Hack
blog.verichains.io
Copy link
Facebook
Email
Note
Other
Outsmarting Reentrancy: How Transient Storage Saves Gas in Smart Contracts
Introduction of reentrancy protection's gas optimization by using a new feature in Solidity: transient storage (TSTORE, TLOAD)
May 10
•
LowK
Share this post
Outsmarting Reentrancy: How Transient Storage Saves Gas in Smart Contracts
blog.verichains.io
Copy link
Facebook
Email
Note
Other
Share
Copy link
Facebook
Email
Note
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts